Wednesday, May 6, 2020
Privacy And Other Similar Issues On Internet-Myassignmenthelp.Com
Questions: What Are The Current Issues Regarding Internet Privacy? Which Is More Important Security Or Privacy? What Are The Copyright Issues On The Internet? What Are The International Legal Issues Regarding The Internet? Should The Internet Be Censored? Answers: Introduction Privacy is the freedom from unauthorised intrusion (Merriam-Webster). The modern world, based on the foundation of the Internet, and ever-advancing technology is different from all of the human history. Almost everything is instant now, always-connected (Dentzel), and privacy is usually opt-in (Spivack, 2013) rather than an expected quality of any proceeding. What has happened is that in today's attention economy (MacMaster), data is the most valuable asset of businesses. This rush for data of a person (often exchanged free will for free services or products) is usually in conflict with the interests of the individual whose data is being collected, stored, and processed. Your attention and information are the ways how companies pay for the services. For example, Google can provide Gmail for free, and Facebook can provide its website, applications, messengers for free. The questions then become that how can people safeguard their privacy, security, and other related issues. These are the topics that this paper will attend. The paper will look into Internet privacy, compare the importance of security versus privacy, copyright issues, legal issues, and censorship on the Internet. 1.It is often said that in the contemporary society, privacy is a thing of past (Benson, 2016). Some people are indifferent, while others find themselves at the mercy of the businesses and societal trends (Hargittai Marwick, 2016). As mentioned elsewhere in this paper, data about a person, especially the personally identifiable information, is a goldmine, from which economic benefits can regularly be reaped for an indefinite period. For example, if advertisers know that you lean towards animal welfare, the businesses will filter bubble the views, news, and articles you see online (Pariser, 2011). Moreover, then, they can sell you merchandise, and products which lean towards this ideology. This sort of targeted advertising and remarketing is a concern for most web users as it brings to light how a simple search on a favourite search engine can tag them, and they are hounded by products related to that search. The concerns about privacy on the Internet revolve around the topics in which there is conflicts of interests between the businesses and the individual's right to control access to his information. These include tracking a user, and identifying him as he browses various sites on the Internet. The contact details like email and mobile numbers are scraped from public databases or requested for some legitimate task, but then repurposed for marketing unsolicitedly. Also, such databases are sold to third-party marketers without the knowledge or consent of the individual whose data is being exploited for unlawful commercial gains. Another risk is the stealing of credit card data (Chung Paynter, 2002). A hidden tracker in the form a tiny transparent image may be used in email messages to track when the message was opened (and thus assumed to be read). This covert read receipt also goes against the spirit of privacy. 2.Privacy and security have been against each other, and their conflict has only intensified after the 9/11 attacks on the American buildings (Doherty, 2013) (Schneier, 2008). The tug-of-war between the two ideals has boiled down to finding the correct balance between the two (Noble, 2013). To begin, let us analyse the foundation of this conflict. Society and its caretakers (the government, military, etc.) want to curb people with malicious intents. If such people can communicate with one another in privacy, then that is a handicap for the powers and may lead to avoidable losses of human lives, and property. So, this is the argument for the motion of security, which means reducing the privacy of the population. On the other hand, the human psychology is such that power corrupts it, and absolute power corrupts absolutely (Martin, 2017). The fear is that with the God-like power to eavesdrop on any communication using any means of communication, of any individual, the chances of the off icials becoming corrupt, and invading the privacy of individuals for their pleasure, or extortion becomes more possible. Also, the companies running the services would be more than willing to help the governments, as they will not be able to run their businesses without the powers' blessings. For example, Internet-based chatting, video-calling, and file-sharing service Skype have been routinely exposing to law enforcement authorities indiscriminate access to the conversations of Skype users (Kelley, 2012) (Kelley M., 2013) (Gallagher, 2013). The opinion of the author is biased towards the security side. The world we live in allows for far deeper and far wider ways to wreak havoc of any individual, any group, any country, or any cause. In the earlier days, the only way to harm someone would be to grab a weapon and run towards him. Nowadays, in addition to government-authorised killings, terrorism is ever-increasing. Not only that, the ways to hurt now include the plethora of technology, and the always-on lifestyle makes harming easy - remotely, with the click of a button. So, what does an individual who has to attend to his work, family, and also keep his sanity by pursuing leisure activities to do? It is the opinion of the author to delegate the worries, and hand over the responsibilities to the powers of the government, and the military. Thus, primarily due to pragmatism, security is more important than privacy (Sterner, 2014). 3.If you do not want your writing to be edited mercilessly and redistributed at will", is how Wikipedia's policy informs editors contributing to the publicly-editable encyclopedia (Wikipedia, 2005). This statement sums up the state of publishing on the Internet. The Internet is a cheap, convenient, and an instant medium, where most of the effort in stealing some one else's can be automated to scripts, and software applications. Ensuring copyright on the Internet is a difficult task. It is not a surprise that the Internet is considered the largest threat to copyright ever since its inception (Copyright Website). The copyright issues on the Internet begin from the moment the data is sent from the web server to the client machine. The first concern is that at least four separate copies of the content are created in the underlying process of visiting a website. This dilemma has been resolved as acceptable as when an author publishes a website on the Internet, he expects people to visit it, and the copies created in the memory, disk, browser cache, etc. are considered essential technical aspects of this process. This consideration gives us an idea of the depth of the issue. On a more practical note, the issues include peer-to-peer file sharing, illegal download sites, software cracks and keys, scraping content from some one else's web sites, and similar stealing. 4.The Internet is a technology that levels the playing field for the big businesses, and the common man alike. Self-publishing is virtually free, instant, and knows no geography or time zone limitations (Capling Nossal, 2010). This nature of the Internet gives birth to issues which transcend international borders. One category of legal matters deal with free speech and the restrictions on that. The problems are defamation, breach of contract, tortious interference with business, and securities fraud (Raccine). Another issue is the transmission of data. The Internet is a packet-based technology (Rouse, 2007), and thus the individual packets of a message from the sender to the recipient may traverse independent paths to allow for congestion handling, accounting for broken or new paths, etc. Now, for data which is to be sent and received with the same country, there is a little political need for it to leave the international borders of the country, and laws can be enacted to enforce t his technology wise. Money laundering is an activity that covers multiple countries and uses the Internet as its latest medium. Such money is often earned illegally and is routed for antisocial, and illegal activities like terrorism. To cleanse this money, unsuspecting greedy people are offered a fee to route the money from the victim's bank account. Another issue is the dissemination of prohibited content like child pornography, peer-to-peer files database (for example torrents) from areas where the laws are lax, and the victim countries will have difficulty in directly handling the miscreants. 5.Before beginning any discussion on censorship on the Internet, we should distil down what the Internet fundamentally is. Internet is a communication medium, serving in all of the one-to-one (for example, email, chat, voice call), one-to-many (for example, posting a message in a restricted group) capacity, and as a broadcast medium (like advertising on television, or radio by posting on public blogs, social media sites). What makes the Internet different from the traditional media is the relative inexpensiveness, near-instant publication, preserving the history indefinitely at multiple places, and reliable search among the oceans of information (for example using search engines like Google). The Internet and the commercial interests of big businesses have enabled free self-publishing, in various forms (text, audio, video) for every person anywhere in the world. Now, this poses problems for the powers that are to govern and keep the large population of people in check, for example, China (Congressional-Executive Commission on China). Traditionally, authorities have relied on restricting physical movement of individuals, in addition to limiting or banning media like newspaper, radio, television, shutting off the telephone, mobile services. Censorship, to stop the flow of ideas from one to another. In some cases, such acts are for the benefit of the nation. On the other hand, similar to the theme of power corrupting the few who hold it, such bans aid in maintaining power, even if the national interests are being subverted by those who are supposed to protect them. In such instances, any censorship will amount to withholding basic human rights. Specifically, the Article 19 (International Council on Human Rights Policy) lays the right to seek, receive, and impart information with no regards to media, and no regards to borders. Such a definition includes all forms of communication, as existing today, and any in future. The author of this paper strongly aligns with the human rights stance, and advocates against the censorship of the Internet for the reason that governments are installed to serve the people, and general information flow should not be a concern for authorities which are discharging their fiduciary responsibilities well. Conclusion The average Internet user's habit of free things - which cost real money to develop, and provide - has resulted in a tacit system of exchange in which the individual's data and attention is taken, and a (useful in itself) service is provided. This one transaction underlies most of the issues at hand in the tug-of-war between user privacy, and the businesses. Also, governments have their axes to grind and use their powers to snoop on their citizens. Overall, privacy is a feature that appears to be inconsequential to the masses, with opportunities for businesses to capitalise upon References Benson, T. (2016, September 15). Privacy, the forgotten issue: Apathy is making Americans vulnerable. Retrieved from Salon: https://www.salon.com/2016/09/14/privacy-the-forgotten-issue-apathy-is-making-americans-vulnerable/ Capling, A., Nossal, K. R. (2010). Death of distance or tyranny of distance? The Internet, deterritorialization, and the anti-globalization movement in Australia. The Pacific Review, 443-465. Chung, W., Paynter, J. (2002). Privacy issues on the Internet. Proceedings of the 35th Hawaii International Conference on System Sciences. Hawaii. doi:10.1109/HICSS.2002.994191 Congressional-Executive Commission on China. (n.d.). Freedom of Expression in China: A Privilege, Not a Right. Retrieved from Congressional-Executive Commission on China: https://www.cecc.gov/freedom-of-expression-in-china-a-privilege-not-a-right Copyright Website. (n.d.). Copyright Website. Retrieved from Copyright Website: https://www.benedict.com/info/info Dentzel, Z. (n.d.). How the Internet Has Changed Everyday Life. Retrieved from Open Mind: https://www.bbvaopenmind.com/en/article/internet-changed-everyday-life/?fullscreen=true Doherty, C. (2013, June 07). Balancing Act: National Security and Civil Liberties in Post-9/11 Era. Retrieved from Pew Research Center: https://www.pewresearch.org/fact-tank/2013/06/07/balancing-act-national-security-and-civil-liberties-in-post-911-era/ Gallagher, R. (2013, October 11). Skype under investigation in Luxembourg over link to NSA. Retrieved from The Guardian: https://www.theguardian.com/technology/2013/oct/11/skype-ten-microsoft-nsa Hargittai, E., Marwick, A. (2016). What Can I Really Do? Explaining the Privacy Paradox with Online Apathy. International Journal of Communication, 3737-3757. International Council on Human Rights Policy. (n.d.). Article 19 - Universal Declaration of Human Rights. Retrieved from International Council on Human Rights Policy: https://www.ichrp.org/en/article_19_udhr Kelley, M. (2013, January 26). Privacy Advocates Urge Skype To Disclose Info About Alleged Government Spying. Retrieved from Business Insider: https://www.businessinsider.in/Privacy-Advocates-Urge-Skype-To-Disclose-Info-About-Alleged-Government-Spying/articleshow/21416573.cms Kelley, M. B. (2012, July 26). Skype Could Be Helping The Feds Spy On US Citizens By Handing Over Chats. Retrieved from Business Insider: https://www.businessinsider.com/skype-accused-of-helping-government-spy-on-people-2012-7?IR=T MacMaster, K. (n.d.). The Attention Economy: Why Marketers Are Killing, Not Capturing, Attention. Retrieved from Vidyard: https://www.vidyard.com/blog/attention-economy-marketers-killing-not-capturing-attention/ Martin, G. (2017). 'Absolute power corrupts absolutely' - the meaning and origin of this phrase. Retrieved from The Phrase Finder: https://www.phrases.org.uk/meanings/absolute-power-corrupts-absolutely.html Merriam-Webster. (n.d.). Privacy | Definition of Privacy by Merriam-Webster. Retrieved from Merriam-Webster: https://www.merriam-webster.com/dictionary/privacy Noble, J. (2013, September 13). U.S. debates security vs. privacy 12 years after 9/11. Retrieved from USA Today: https://www.usatoday.com/story/news/nation/2013/09/10/us-debates-security-vs-privacy-12-years-after-911/2796399/ Pariser, E. (2011, May 2). Beware online "filter bubbles". Retrieved from TED Talk: https://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles Raccine, S. (n.d.). Legal Issues and the Internet. Retrieved from Off the Page Creations: https://www.offthepagecreations.com/legal_issues_internet.php Rouse, M. (2007, April). packet-switched. Retrieved from Tech Target: https://searchnetworking.techtarget.com/definition/packet-switched Schneier, B. (2008, January 29). Security vs. Privacy. Retrieved from Schneier on Security: https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html Spivack, N. (2013, July 26). The Post-Privacy World. Retrieved from Wired: https://www.wired.com/insights/2013/07/the-post-privacy-world/ Sterner, E. (2014, March 10). The security vs. privacy debate is already over, and privacy lost. Retrieved from Washington Examiner: https://www.washingtonexaminer.com/the-security-vs-privacy-debate-is-already-over-and-privacy-lost/article/2545407 Wikipedia. (2005, June 9). Wikipedia:Annotated edit page announcement (proposal). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Wikipedia:Annotated_edit_page_announcement_(proposal)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.